> > passphrase is incorrect). This seems to be a slow method: my 2.8GHz P4
> > can only do it 220 times a second. So I was wondering: is there a faster
> I guess we can douple or triple the performance but not much more.
> The whole point of the algorithm is to slow things down.
Ok/
> Things to do: Avoid the overhead of the cyptoframe work and thus write
> an optimized hash function. Avoid dynamic memory allocation and reuse
> buffers. And all the other usual micro optmimizations.
Ah yes, and split the passphrase-callback function into two: one for asking
and one for freeing up buffers that might have been created in the first
one.
> It does not make much sense unless you want to write a passphrase cracker, though.
That's what it is for yes (http://www.vanheusden.com/nasty/) - altough
I also create friendly programs (http://www.vanheusden.com/gpgstats/ - generate
statistics for your keyring).
Folkert van Heusden
Auto te koop, zie: http://www.vanheusden.com/daihatsu.php
Op zoek naar een IT of Finance baan? Mail me voor de mogelijkheden.
--------------------------------------------------------------------
UNIX admin? Then give MultiTail (http://vanheusden.com/multitail/)
a try, it brings monitoring logfiles to a different level! See
http://vanheusden.com/multitail/features.html for a feature-list.
--------------------------------------------------------------------
Phone: +31-6-41278122, PGP-key: 1F28D8AE
Get your PGP/GPG key signed at www.biglumber.com!
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 282 bytes
Desc: Digital signature
Url : /pipermail/attachments/20050411/971b8d09/attachment.pgp